0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (92)
  • R500+ (1,401)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Advances of DNA Computing in Cryptography (Hardcover): Suyel Namasudra, Ganesh Chandra Deka Advances of DNA Computing in Cryptography (Hardcover)
Suyel Namasudra, Ganesh Chandra Deka
R3,917 Discovery Miles 39 170 Ships in 12 - 17 working days

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Real-Time System Security (Hardcover): Brett Tjaden, Lonnie R. Welch Real-Time System Security (Hardcover)
Brett Tjaden, Lonnie R. Welch
R2,216 R1,704 Discovery Miles 17 040 Save R512 (23%) Ships in 12 - 17 working days

Mission critical real-time systems often function in environments that cannot be modelled with static approaches. Because of their (externally-driven) wide dynamic range of system operation, the number of data elements to be processed in an arbitrary period is unknown at the time of system engineering (other than an extremely pessimistic worst case sense). While it may be possible to determine a theoretical upper bound on the number of data items, the construction and maintenance of system components to handle worst-case conditions can be prohibitively costly. To accommodate such dynamic mission critical real-time systems, it is useful to design computing systems that allow reconfiguration and reallocation of resources by sharing a pool of distributed computational resources. Unfortunately, the problem of continuously providing critical system functions in such dynamic real-time environments is exacerbated when one considers attack vulnerability. The Internet has made mission critical real-time computer systems subject to an ever-changing array of attacks for which current defence mechanisms are insufficient. In order to combat intruders in this new environment, new techniques must be developed that enable decision makers to detect unusual behaviour in their systems, correlate anomalies into higher-level attacker goals, plan appropriate response actions, and execute their plans. This special book presents current work in this general area of real-time system security.

The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R430 Discovery Miles 4 300 Ships in 10 - 15 working days
Image Encryption - A Communication Perspective (Hardcover, New): Fathi E. Abd El-Samie, Hossam Eldin H.  Ahmed, Ibrahim F... Image Encryption - A Communication Perspective (Hardcover, New)
Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F Elashry, Mai H. Shahieen, Osama S Faragallah, …
R4,238 Discovery Miles 42 380 Ships in 12 - 17 working days

Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB (R) codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.

Handbook of Financial Cryptography and Security (Hardcover, New): Burton Rosenberg Handbook of Financial Cryptography and Security (Hardcover, New)
Burton Rosenberg
R4,562 Discovery Miles 45 620 Ships in 12 - 17 working days

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more. In the first part, the book examines blind signatures and other important cryptographic techniques with respect to digital cash/e-cash. It also looks at the role of cryptography in auctions and voting, describes properties that can be required of systems implementing value exchange, and presents methods by which selected receivers can decrypt signals sent out to everyone. The second section begins with a discussion on lowering transaction costs of settling payments so that commerce can occur at the sub-penny level. The book then addresses the challenge of a system solution for the protection of intellectual property, before presenting an application of cryptography to financial exchanges and markets. Exploring financial cryptography in the real world, the third part discusses the often-complex issues of phishing, privacy and anonymity, and protecting the identity of objects and users. With a focus on human factors, the final section considers whether systems will elicit or encourage the desired behavior of the participants of the system. It also explains how the law and regulations impact financial cryptography. In the real world, smart and adaptive adversaries employ all types of means to circumvent inconvenient security restraints. This useful handbook provides answers to general questions about the field of financial cryptography as well as solutions to specific real-world security problems.

Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback): Keith Martin Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback)
Keith Martin
R381 Discovery Miles 3 810 Ships in 9 - 15 working days

Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.

Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New): M Stamp Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New)
M Stamp
R3,001 Discovery Miles 30 010 Ships in 12 - 17 working days

A case-based approach to cryptanalysis that explains how and why attacks can happen

Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.

The text is organized around four major themes:

Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba.

Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL).

Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5.

Public Key Crypto includes an overview of several public key cryptosystems including theknapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail.

Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.

Understanding and Applying Cryptography and Data Security (Paperback): Adam J. Elbirt Understanding and Applying Cryptography and Data Security (Paperback)
Adam J. Elbirt
R1,828 Discovery Miles 18 280 Ships in 12 - 17 working days

A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encryption Standard (AES). Subsequent chapters on public-key cryptographic algorithms cover the underlying mathematics behind the computation of inverses, the use of fast exponentiation techniques, tradeoffs between public- and symmetric-key algorithms, and the minimum key lengths necessary to maintain acceptable levels of security. The final chapters present the components needed for the creation of cryptographic protocols and investigate different security services and their impact on the construction of cryptographic protocols. Offers Implementation Comparisons By examining tradeoffs between code size, hardware logic resource requirements, memory usage, speed and throughput, power consumption, and more, this textbook provides students with a feel for what they may encounter in actual job situations. A solutions manual is available to qualified instructors with course adoptions.

Principles of Information Security (Paperback, 6th edition): Michael Whitman, Herbert Mattord Principles of Information Security (Paperback, 6th edition)
Michael Whitman, Herbert Mattord
R1,263 R1,135 Discovery Miles 11 350 Save R128 (10%) Ships in 10 - 15 working days

Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.

Noiseless Steganography - The Key to Covert Communications (Hardcover, New): Abdelrahman Desoky Noiseless Steganography - The Key to Covert Communications (Hardcover, New)
Abdelrahman Desoky
R3,635 Discovery Miles 36 350 Ships in 12 - 17 working days

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise by altering digital images, audio files, text, etc. However, such alteration raises suspicion and makes the message discernible by detecting its noise. Addressing such shortcomings, Noiseless Steganography: The Key to Covert Communications introduces a novel Noiseless Steganography Paradigm (Nostega). Rather than hiding data in noise or producing noise, Nostega camouflages messages as well as their transmission in the form of unquestionable data in the generated steganographic cover. The book explains how to use Nostega to determine suitable domains capable of generating unsuspicious steganographic cover in which messages are embedded in the form of innocent data that is compatible with the chosen domain. It presents a number of Nostega-based methodologies, including but not limited to: A novel cover type that enables data to be hidden in plotted graphs A novel methodology that pursues popular games such as chess, checkers, crosswords, and dominoes to conceal messages Comprehensive coverage of linguistic steganography Several novel linguistic steganography methodologies based on Natural Language Processing and Computational Linguistic techniques such as: Education-Centric-Based, Summarization-Based, Natural Language Generation Based, Random-Series-Based, Email Headers Based, Automatic Joke Generation Based, List-Based, and Automatic Notes Generation Based The first book to provide comprehensive coverage of Linguistic Steganography, Graph Steganography, and Game Steganography, it discusses the implementation and steganalysis validation of ten Nostega-based methodologies. It describes how to establish covert channels by employing the selected domain to serve as justification for the interaction and delivery of the cover among the communicating parties. Instead of using contemporary steganography approaches to camouflage your data as noise that is assumed to look innocent, the text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether.

IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job (Paperback): C. Butler IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job (Paperback)
C. Butler
R653 R519 Discovery Miles 5 190 Save R134 (21%) Ships in 12 - 17 working days

* Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help * Divided into two parts: how to get the job and a security crash course to prepare for the job interview * Security is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position * Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's toolkit, and documenting work * The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008

Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience, and ROI (Hardcover):... Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience, and ROI (Hardcover)
Debra S. Herrmann
R3,998 Discovery Miles 39 980 Ships in 12 - 17 working days

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization's mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls. Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.

RC4 Stream Cipher and Its Variants (Paperback): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Paperback)
Goutam Paul, Subhamoy Maitra
R1,865 Discovery Miles 18 650 Ships in 12 - 17 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition): Mark Ciampa Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition)
Mark Ciampa
R1,098 R988 Discovery Miles 9 880 Save R110 (10%) Ships in 10 - 15 working days

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.

A Practical Guide to Security Assessments (Hardcover, New): Sudhanshu Kairab A Practical Guide to Security Assessments (Hardcover, New)
Sudhanshu Kairab
R3,666 Discovery Miles 36 660 Ships in 12 - 17 working days

This book is a detailed methodology of performing a security assessment. The book emphasizes the approach of first understanding the business and then the technology that supports it. It focuses on fundamental process areas of security and provides a methodology for security practitioners to uncover security weaknesses in other existing business processes. With the emphasis on the business driving security, this book presents a standard methodology for performing a security assessment as well as the reasons for doing it that way. It also provides checklists for process-oriented areas of information security to provide detailed guidance that can be used in performing a security assessment.

RSA and Public-Key Cryptography (Hardcover): Richard A. Mollin RSA and Public-Key Cryptography (Hardcover)
Richard A. Mollin
R5,101 Discovery Miles 51 010 Ships in 12 - 17 working days

Although a vast literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level. Acclaimed author Richard A. Mollin brings together all of the relevant information available on public-key cryptography (PKC), from RSA to the latest applications of PKC, including electronic cash, secret broadcasting, secret balloting systems, various banking and payment protocols, high security logins, smart cards, and biometrics. Moreover, he covers public-key infrastructure (PKI) and its various security applications.

Throughout the book, Mollin gives a human face to cryptography by including nearly 40 biographies of the individuals who helped develop cryptographic concepts. He includes a number of illustrative and motivating examples, as well as optional topics that go beyond the basics, such as Lenstra's elliptic curve method and the number field sieve. From history and basic concepts to future trends and emerging applications, this book provides a rigorous and detailed treatment of public-key cryptography. Accessible to anyone from the senior undergraduate to the research scientist, RSA and Public-Key Cryptography offers challenging and inspirational material for all readers.

Information Hiding in Communication Networks - Fundamentals, Mechanisms, Applications, and Countermeasures (Hardcover): W... Information Hiding in Communication Networks - Fundamentals, Mechanisms, Applications, and Countermeasures (Hardcover)
W Mazurczyk
R2,473 Discovery Miles 24 730 Ships in 12 - 17 working days

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. * Highlights development trends and potential future directions of Information Hiding * Introduces a new classification and taxonomy for modern data hiding techniques * Presents different types of network steganography mechanisms * Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services

The Art of Deception - Controlling the Human Element of Security (Hardcover): KD Mitnick The Art of Deception - Controlling the Human Element of Security (Hardcover)
KD Mitnick
R1,067 R830 Discovery Miles 8 300 Save R237 (22%) Ships in 12 - 17 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Group Theoretic Cryptography (Hardcover, New): Rainer Steinwandt, Maria Isabel Gonzalez Vasco Group Theoretic Cryptography (Hardcover, New)
Rainer Steinwandt, Maria Isabel Gonzalez Vasco
R3,023 Discovery Miles 30 230 Ships in 12 - 17 working days

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future. Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an undergraduate-level understanding of linear algebra and discrete mathematics, it details the specifics of using non-Abelian groups in the field of cryptography. Moreover, the book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES. The book starts with brief overviews of the fundamentals of group theory, complexity theory, and cryptography. Part two is devoted to public-key encryption, including provable security guarantees, public-key encryption in the standard model, and public-key encryption using infinite groups. The third part of the book covers secret-key encryption. It examines block ciphers, like the Advanced Encryption Standard, and cryptographic hash functions and message authentication codes. The last part delves into a number of cryptographic applications which are nowadays as relevant as encryption-identification protocols, key establishment, and signature schemes are covered. The book supplies formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory. Summaries and references for further reading, as well as exercises, are included at the end of each chapter. Selected solutions for exercises are provided in the back of the book.

Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover): John McCumber Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover)
John McCumber
R2,155 Discovery Miles 21 550 Ships in 12 - 17 working days

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Information Hiding in Speech Signals for Secure Communication (Paperback): Zhijun Wu Information Hiding in Speech Signals for Secure Communication (Paperback)
Zhijun Wu
R1,321 Discovery Miles 13 210 Ships in 12 - 17 working days

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. "Information Hiding in Speech Signals for Secure Communication" provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more.

This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
Presents information hiding theory and the mathematical model used for information hiding in speech.Provides a number of methods to hide secret speech information using the most common digital speech coding standards.A combination of practice and theory enables programmers and system designers not only to implement tried and true encryption procedures, but also to consider probable future developments in their designs.

Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Hardcover): Alexander Stanoyevitch Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Hardcover)
Alexander Stanoyevitch
R3,011 Discovery Miles 30 110 Ships in 12 - 17 working days

From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed.

Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms.

As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.

Strategies for Protecting National Critical Infrastructure Assets - A Focus on Problem-Solving (Hardcover): J Sullivant Strategies for Protecting National Critical Infrastructure Assets - A Focus on Problem-Solving (Hardcover)
J Sullivant
R3,815 Discovery Miles 38 150 Ships in 12 - 17 working days

Developing solid, thorough infrastructure security assessments in diverse sectors

Drawing on the collective experience of many experts, this definitive reference presents the best methods, techniques, and measurements to help security analysts conduct objective security assessments. It helps readers understand advanced security assessment concepts in today's high-risk world and identify, measure, and prioritize security risks. A comprehensive, practical guide, this resource:

Describes a practical, proven approach that has been used in over 3,000 security assessments in thirty countries

Features three primary sections: an introduction that helps analysts understand today's challenging environment; an overview of security assessment methodology broken down into five specific elements; and details on tailoring the methodology to specific industries

Defines the purpose of the security assessment process, the behavioral and physical sciences brought into play, the techniques used, and measurement and evaluation tools and standards

Presents an S3E comprehensive, system-integrated methodology supported by user-friendly, step-by-step guidance that is complemented by a series of S3E Security Assessment Methodology matrices

Includes chapters dedicated to specific infrastructure sectors: water; energy; transportation; chemical industry and hazardous materials; agriculture and food; banking and finance; and telecommunications

Provides worksheets that facilitate the cataloging and documenting of research data

This book gives consultants, security practitioners, corporate security managers and directors, and others a reliable, hands-on "briefcase" reference to use in theoffice as well as in the field. It's also an ideal text for upper-level students in related courses.

Discrete Mathematics with Cryptographic Applications - A Self-Teaching Introduction (Hardcover): Alexander I Kheyfits Discrete Mathematics with Cryptographic Applications - A Self-Teaching Introduction (Hardcover)
Alexander I Kheyfits
R1,965 Discovery Miles 19 650 Ships in 12 - 17 working days

This book covers the discrete mathematics as it has been established after its emergence since the middle of the last century and its elementary applications to cryptography. It can be used by any individual studying discrete mathematics, finite mathematics, and similar subjects. Any necessary prerequisites are explained and illustrated in the book. As a background of cryptography, the textbook gives an introduction into number theory, coding theory, information theory, that obviously have discrete nature. Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous, practical examples of cryptography. FEATURES Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous examples of cryptography Provides an introduction into number theory, game theory, coding theory, and information theory as background for the coverage of cryptography Covers cryptography topics such as CRT, affine ciphers, hashing functions, substitution ciphers, unbreakable ciphers, Discrete Logarithm Problem (DLP), and more

Computer Forensics - An Essential Guide for Accountants, Lawyers and Managers (Hardcover): M Sheetz Computer Forensics - An Essential Guide for Accountants, Lawyers and Managers (Hardcover)
M Sheetz
R1,996 Discovery Miles 19 960 Ships in 12 - 17 working days

Would your company be prepared in the event of:
* Computer-driven espionage
* A devastating virus attack
* A hacker's unauthorized access
* A breach of data security?
As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks.
The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs.
Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Digital Watermarking and Steganography…
Frank Y. Shih Hardcover R3,034 Discovery Miles 30 340
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
Hacking Connected Cars - Tactics…
A. Knight Paperback R877 Discovery Miles 8 770
Insider Computer Fraud - An In-depth…
Kenneth Brancik Paperback R1,788 Discovery Miles 17 880
The Official (ISC)2 CCSP CBK Reference…
a. Kraus Hardcover R1,390 Discovery Miles 13 900
Alice and Bob Learn Application Security
T Janca Paperback R885 Discovery Miles 8 850

 

Partners